KJ33D-Things you have to know about Home Automation in Apartments
Things you have to know about home automation in apartments. Home automation has become a buzzword in the real estate industry. With the advent of modern technology, home automation has made life more convenient, efficient, and comfortable. Home automation is a smart solution that can turn an ordinary apartment into a smart living space. For those who are new to the concept...
FindUncommonShares A Python Equivalent Of PowerView’s Invoke-ShareFinder.ps1 Allowing To Quickly Find Uncommon Shares In Vast Windows Domains
FindUncommonShares.py is a Python equivalent of PowerView's Invoke-ShareFinder.ps1 allowing to quickly find uncommon shares in vast Windows Domains. Features Only requires a low privileges domain user account. Automatically gets the list of all computers from the domain controller's LDAP. Ignore the hidden shares (ending with $) with --ignore-hidden-shares. Multithreaded connections to discover SMB shares. Export results in JSON with IP, name, comment, flags and UNC...
CertVerify : A Scanner That Files With Compromised Or Untrusted Code Signing Certificates
CertVerify is a scanner that files with compromised or untrusted code signing certificates written in python. The CertVerify is a tool designed to detect executable files (exe, dll, sys) that have been signed with untrusted or leaked code signing certificates. The purpose of this tool is to identify potentially malicious files that have been signed using certificates that have been...
CertWatcher : A Tool For Capture And Tracking Certificate Transparency Logs, Using YAML Templates Based DSL
CertWatcher is a tool for capture and tracking certificate transparency logs, using YAML templates based DSL. CertWatcher is a tool for capture and tracking certificate transparency logs, using YAML templates. The tool helps to detect and analyze phishing websites and regular expression patterns, and is designed to make it easy to use for security professionals and researchers. Certwatcher continuously monitors the...
MacOSThreatTrack : Bash Tool Used For Proactive Detection Of Malicious Activity On macOS Systems
MacOSThreatTrack is a Bash tool used for proactive detection of malicious activity on macOS systems. The tool is being tested in the beta phase, and it only gathers MacOS system information at this time. The code is poorly organized and requires significant improvements. Description Bash tool used for proactive detection of malicious activity on macOS systems. I was inspired by Venator-Swift and decided to...
Graphicator : A GraphQL Enumeration And Extraction Tool
Graphicator is a GraphQL "scraper" / extractor. The tool iterates over the introspection document returned by the targeted GraphQL endpoint, and then re-structures the schema in an internal form so it can re-create the supported queries. When such queries are created is using them to send requests to the endpoint and saves the returned response to a file. Erroneous responses...
DataSurgeon : Quickly Extracts IP’s, Email Addresses, Hashes, Files, Credit Cards, Social Secuirty Numbers And More From Text
DataSurgeon (ds) is a versatile tool designed for incident response, penetration testing, and CTF challenges. It allows for the extraction of various types of sensitive information including emails, phone numbers, hashes, credit cards, URLs, IP addresses, MAC addresses, SRV DNS records and a lot more! Supports Windows, Linux and MacOS Extraction Features Emails Files Phone numbers Credit Cards Google API Private Key ID's Social Security Numbers AWS Keys Bitcoin...
Thunderstorm : Modular Framework To Exploit UPS Devices
Thunderstorm is a modular framework to exploit UPS devices. For now, only the CS-141 and NetMan 204 exploits will be available. The beta version of the framework will be released on the future. CVE Thunderstorm is currently capable of exploiting the following CVE: CVE-2022-47186 – Unrestricted file Upload # CVE-2022-47187 – Cross-Site Scripting via File upload # CVE-2022-47188 – Arbitrary local file read...
RedTeam-Physical-Tools : Red Team Toolkit Used In The Field For Physical Security, Red Teaming, And Tactical Covert Entry
Red Team Toolkit is a curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert Entry. Red Team - Physical Security - Covert Entry - EDC Disclaimer: I am not responsible for anyone using any information in this post for any illegal activities. Getting caught with possession of burglary tools will...
X-force : IBM Security Utilitary Library In Python
X-force, IBM Security utilitary library in python. Search and query all sources: threat_activities and groups, malware_analysis, industries Install pip3 install XForce Use Using you API_KEY make a basic authentication. See . After make a base64 code → Key + : + Password: printf "d2f5f0f9-2995-42c6-b1dd-4c92252da129:06c41d5e-0604-4c7c-a599-300c367d2090" | base64 # ZDJmNWYwZjktMjk5NS00MmM2LWIxZGQtNGM5MjI1MmRhMTI5OjA2YzQxZDVlLTA2MDQtNGM3Yy1hNTk5LTMwMGMzNjdkMjA5MAo= Using API_KEY, call functions. See for key storage Call functions import XForce # Args: 1 - Term of search, 2...